phplugins / Leaked_Malware_SourceCode
☆18Updated 9 years ago
Alternatives and similar repositories for Leaked_Malware_SourceCode:
Users that are interested in Leaked_Malware_SourceCode are comparing it to the libraries listed below
- ☆25Updated 7 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 7 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Shellcode tracer☆15Updated 8 years ago
- Anti-technique Codes, Detection of Anti-technique codes☆38Updated 11 years ago
- My manual analysis of malware families☆13Updated 7 years ago
- Short for Good Ware; it assists Reverse Engineers in the analysis of Windows Malware.☆24Updated 12 years ago
- Malware monitor template based on MinHook☆16Updated 9 years ago
- PCAUSA Rawether for Windows Local Privilege Escalation☆38Updated 7 years ago
- metasploit loader with antivirus bypass module☆17Updated 8 years ago
- Dalvik Header Plugin for IDA Pro☆21Updated 12 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Updated 9 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- ☆22Updated 7 years ago
- Web Based Crypter☆7Updated 11 years ago
- Analysis and Modification Tool for Executables☆16Updated 5 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- just a basic rootkit for learning how to playing sys_call_table☆14Updated 8 years ago
- The Horrific Omnipotent Rootkit☆22Updated 7 years ago
- CVE-2014-0816☆24Updated 8 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Updated 9 years ago
- Flash Exploit Detector☆7Updated 9 years ago
- Collection of IDA Pro plugins I wrote over the years☆23Updated 14 years ago
- it's a simple LKM rootkit.☆12Updated 8 years ago
- ☆12Updated 9 years ago
- All tools you needed during penetration testing.☆17Updated 7 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- D-RAT SRC Extract☆11Updated 8 years ago
- dll injection library☆9Updated 10 years ago